US20200089915A1 - Method and apparatus for tamper-proof storage of information in respect of object-related measures - Google Patents
Method and apparatus for tamper-proof storage of information in respect of object-related measures Download PDFInfo
- Publication number
- US20200089915A1 US20200089915A1 US16/495,116 US201816495116A US2020089915A1 US 20200089915 A1 US20200089915 A1 US 20200089915A1 US 201816495116 A US201816495116 A US 201816495116A US 2020089915 A1 US2020089915 A1 US 2020089915A1
- Authority
- US
- United States
- Prior art keywords
- transaction
- blockchain
- data memory
- block
- transactions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000003860 storage Methods 0.000 title claims abstract description 8
- 230000015654 memory Effects 0.000 claims abstract description 58
- 230000006870 function Effects 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 8
- 238000010200 validation analysis Methods 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 4
- 230000008901 benefit Effects 0.000 description 19
- 238000009434 installation Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 10
- 230000008859 change Effects 0.000 description 7
- 238000012360 testing method Methods 0.000 description 6
- 230000008439 repair process Effects 0.000 description 4
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 241000712062 Patricia Species 0.000 description 1
- 230000000454 anti-cipatory effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000002591 computed tomography Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000011065 in-situ storage Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000009607 mammography Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H04L2209/38—
Definitions
- Objects for example devices, device components or other products, may comprise an object data memory for storing various information items in relation to the relevant object.
- data in respect of the identity of the object or of other processes relating to the object can be stored in the object data memory of an object.
- diagnostic data, servicing information data, repair information data or details of transferred ownership can be stored in an object data memory of the object.
- the object data memory of an object can be integrated in the object or can be physically connected to the object. Alternatively, the object data memory can also be situated at a distance from the object and can be assigned to the object.
- information or data in respect of the object can be stored as a so-called digital twin or as part of a digital twin on a distant computer system, more particularly a web service or an IoT backend system.
- a web service or an IoT backend system Particularly in the case of security-critical applications, it is necessary to protect the data stored in the object data memory of an object against tampering.
- this aspect is achieved by a method and a system for tamper-proof storage of information in respect of object-related measures, having the features specified in the patent claims.
- the measures relating to the object are contained as transactions in transaction blocks that are linked together in a transaction blockchain of the object, the transaction blockchain being stored in an object data memory assigned to the object.
- the transaction blocks of the transaction blockchain of the object may be linked together by way of a cryptographic hash function. This embodiment offers the advantage of further increasing the protection against tampering.
- An associated individual hash function can be used for each object.
- the protection against tampering is further increased.
- An associated hash function can be used for a plurality of objects of a group of objects. This offers the advantage of a reduction in management outlay in the method according to embodiments of the invention.
- the transaction blocks of the transaction blockchain of the object can be linked together by way of pointer addresses. This offers the advantage of a simple implementation.
- Each transaction block may comprise at least one transaction, which specifies a measure undertaken on the object or a measure undertaken by the object itself. This embodiment offers the advantage of saving memory space.
- An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as a predetermined time period ends. This offers the advantage of simplifying the management of the stored data.
- An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as the number of transactions contained in the last transaction block of the transaction blockchain reaches a threshold. This likewise offers the advantage of simplifying the management of the data.
- An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as a certain event is detected. This likewise offers the advantage of simplifying the management of the data.
- An additional transaction block for the transaction blockchain of the object can be generated automatically as soon as a corresponding user command is entered via an interface. This offers the advantage of allowing a user to prompt the generation of an additional transaction block.
- a transaction can be selected from a group of predetermined transactions that are admissible for the object and the transaction can be stored in the last transaction block of the transaction blockchain. This offers the advantage of being able to predefine transactions.
- Each transaction block of the transaction blockchain may contain a timestamp, a digital signature and/or proof-of-work evidence. This offers the advantage of further increasing the protection against tampering.
- an additional transaction block can be linked to the last transaction block situated at the end of the transaction blockchain of the object. This likewise offers the advantage of increasing the protection against tampering.
- Each transaction contains a validation program code or is assignable to a validation program code. This offers the advantage of the method according to embodiments of the invention being flexibly adaptable to various use cases.
- An additional transaction block can be validated as valid should all transactions contained in the transaction block be verified as admissible by means of an associated validation program code. This offers the advantage of further increasing the protection against tampering.
- a transaction, or each transaction, of a transaction block may have a public key of an object owner and a specification of a key algorithm used for a digital signature. This likewise offers the advantage of further increasing the protection against tampering.
- the transaction blockchain of an object can be read from the object data memory of the object by means of a read device and the transactions contained in the transaction blocks of the read transaction blockchain are verified as admissible on the basis of their respective validation program code.
- a transaction verified as admissible on the basis of its validation program code at the time of writing to the object data memory of the object and/or at the time of reading from the object data memory of the object can automatically trigger the corresponding measure on the object or confirms the measure being undertaken on the object.
- This likewise offers the advantage of the method according to embodiments of the invention being flexibly usable in a multiplicity of different use cases.
- a plurality of transaction blocks of the transaction blockchain of an object can be automatically combined to form a transaction block as soon as a predetermined time period ends or as soon as the number of transaction blocks contained in the transaction blockchain reaches a threshold or in response to a detected event, in particular when memory in the object data memory runs low, or in response to an entered user command. This offers the particular advantage of minimizing the required memory space.
- a system for controlling and monitoring measures that can be undertaken on objects or that can be undertaken by objects themselves, wherein an object data memory is assigned to each object of the system, wherein the measures relating to the object are contained as transactions in transaction blocks that are linked together in a transaction blockchain of the object, the transaction blockchain being stored in the object data memory of the object.
- the objects may comprise hardware components, more particularly devices. This offers the advantage of the system according to embodiments of the invention being employable in an industrial installation, in particular.
- the objects may comprise software components, in particular utility software. This offers the advantage of the system according to embodiments of the invention also being able to be used in a software system.
- FIG. 1 shows a schematic block diagram for explaining the functionality of the method according to embodiments of the invention and the apparatus according to embodiments of the invention for tamper-proof storage of information in respect of object-related measures;
- FIG. 2 shows a schematic illustration for explaining possible embodiments of a system according to embodiments of the invention for controlling and monitoring object-related measures
- FIG. 3 shows a schematic illustration of a transaction blockchain usable in the method according to embodiments of the invention and the system according to the invention
- FIG. 4 shows a schematic illustration of an exemplary embodiment of a transaction contained within a transaction block of the transaction blockchain, as may be used in the method according to embodiments of the invention and the system according to embodiments of the invention;
- FIG. 5 shows a flowchart for illustrating a write process undertaken in the method according to embodiments of the invention.
- FIG. 6 shows a flowchart for illustrating a read process undertaken in the method according to embodiments of the invention.
- an object 1 comprises an associated object data memory 2 .
- the object data memory 2 of the object 1 is integrated or contained in the object 1 .
- the object data memory 2 may also be provided at a distance from the associated object 1 , for example in a distant data memory or a distant database.
- the object data memory 2 is assignable to the object by way of an ID of the object 1 .
- data can be written to the object data memory 2 and/or data can be read from the object data memory 2 with the aid of a portable write and read device 3 .
- the object 1 can be a device, for example a smart drive.
- the object 1 may be a hardware component or a plurality of assembled hardware components.
- the object 1 is a device of an industrial installation.
- Examples for objects that may comprise an object data memory 2 include controllers, programmable logic controllers, sensors, actuators, input/output modules, transmissions, turbines, motors, converters, computed tomography scanners, mammography devices, ultrasonic devices or circuit breakers.
- the object 1 can also be a software component, more particularly utility software.
- the software component can be a factory service, a management service or a cloud service, for example.
- an object data memory 2 is assignable to each software component of the system.
- At least one transaction blockchain TBK Situated in the object data memory 2 of an object 1 , there is at least one transaction blockchain TBK, as illustrated in, e.g., FIG. 3 , provided for the object 1 .
- Any measure relating to the object 1 is noted as a transaction T in a transaction block TB of the transaction blockchain TBK.
- the measures relating to the object 1 are contained as transactions T in transaction blocks TB, which are linked together in the transaction blockchain TBK of the relevant object 1 .
- This transaction blockchain TBK is stored in an object data memory 2 assigned to the object 1 .
- Each transaction block TB of the transaction blockchain TBK comprises at least one transaction T, which specifies a measure undertaken on the object 1 or specifies a measure undertaken by the object 1 itself.
- the transaction blocks TB of the transaction blockchain TBK of the object 1 are linked together by way of a cryptographic hash function H.
- the transaction block TB that forms a data structure comprises at least one hash value that is formed as a function of the preceding transaction block TB.
- Each transaction block TB contains one or more transactions T, as illustrated in FIG. 3 .
- Each transaction T within a transaction block TB specifies a measure undertaken on the object 1 , for example a servicing measure, or a measure undertaken by the object 1 itself, for example a production step.
- a hash value can be formed as a function of the transactions T.
- the number of transactions T contained in a transaction block TB may differ.
- the first transaction block TB 1 of the transaction blockchain TBK illustrated in FIG. 3 contains n 1 transactions T and the second transaction block TB 2 of the transaction blockchain TBK contains n 2 transactions T.
- Each transaction block TB contains at least one transaction T in respect of an object-related measure.
- an associated individual hash function H is used for each object 1 .
- an associated hash function F can be used for a plurality of objects of a group of objects.
- the transaction blocks TB of the transaction blockchain TBK are linked together by way of a cryptographic hash function H.
- the transaction blocks TB of the transaction blockchain TBK of the object 1 may also be linked together by way of pointer addresses.
- the transaction blocks TB of the transaction blockchain TBK are linked in one direction.
- the transaction blocks TB of the transaction blockchain TBK may also be linked together twofold in both directions. This allows the insertion and removal of transaction blocks TB from the transaction blockchain TBK.
- an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as certain circumstances occur.
- an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as a predetermined time period ends.
- an additional transaction block TB for the transaction blockchain TBK is automatically generated at periodic time intervals, for example every 24 hours.
- an additional transaction block TB for the transaction blockchain TBK of an object 1 is generated automatically as soon as the number of transactions T contained in the last transaction block TB of the transaction blockchain TBK reaches a certain threshold or takes up a certain amount of memory space.
- an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as a certain event is detected.
- the object 1 may comprise, e.g., sensors for detecting events.
- the event may also be a change in the state of the object 1 , for example.
- the detected event that caused the generation of a transaction block TB may be an internal event within the object 1 or an external event outside of the object 1 .
- an additional transaction block TB for the transaction blockchain TBK of the object 1 is generated automatically as soon as a corresponding command, more particularly a user command, is received.
- a user or operator of the object 1 can enter a user command via an interface, the user command leading to an additional transaction block TB for the transaction blockchain TBK of the object 1 being generated automatically.
- a transaction T can be selected from a group of predetermined transactions T that are admissible for the object 1 and the transaction can be stored in the last transaction block TB of the transaction blockchain TBK of the object 1 .
- Different objects 1 or devices may have different admissible transactions T for object-related measures.
- the various object-related measures can be indicated to a user or operator of the installation and the user has the option of selecting object-related measures and the associated transaction T by way of a user interface.
- the object-related measure is a measure undertaken by the object 1 itself or a measure undertaken on the object 1 .
- FIG. 4 shows a possible exemplary data structure of a transaction T that may be contained within a transaction block TB of the transaction blockchain TBK.
- Each transaction T may comprise one or more of the data fields illustrated in FIG. 4 .
- the owner or the responsible organization for the object 1 (ownership) OWN is contained in the transaction T.
- the relevant object-related measure MAS may be contained in the transaction T.
- a result ERG of the measure is also specified.
- a self-test measure there may be a specification as to whether the self-test was carried out successfully (okay) or not (not okay).
- the transaction T may contain a date DAT and a timestamp TS.
- the date DAT and the timestamp TS are, e.g., the time at which the object-related measure was undertaken.
- the transaction T may specify, for example, a public key ok, (public key) of an object owner and the specification of a key algorithm (ALG) used for a digital signature SIG.
- ALG key algorithm
- a curve form CUR of an elliptic curve used in the encryption algorithm ALG may be specified, for example.
- the transaction T contains a validation program code VPC or is at least assignable to a validation program code VPC.
- An additional transaction block TB is only linked to the last transaction block TB situated at the end of the transaction blockchain TBK of the object 1 following a successful validation.
- the validation is implemented with the aid of the validation program codes VPC associated with the transactions T of the transaction block TB.
- An additional transaction block TB is validated as valid should all transactions T contained in the transaction block TB be verified as admissible by means of their respective associated validation program code VPC.
- the transaction blockchain TBK of an object 1 can be read by means of a read device from the object data memory 2 of the object 1 .
- the transactions T contained in the transaction blocks TB of the read transaction blockchain TBK can be verified as admissible on the basis of their respective validation program code VPC in one possible embodiment.
- a transaction T verified as admissible on the basis of its validation program code VPC can automatically trigger the corresponding measure MAS on the object 1 or can confirm the measure MAS being undertaken on the object 1 by third parties in one possible embodiment.
- the measure MAS is triggered or confirmed at the time of writing the associated transaction T in the object data memory 2 of the object 1 .
- the relevant measure MAS can also be triggered or confirmed at the time of reading the associated transaction T from the object data memory 2 of the object 1 .
- a plurality of transaction blocks TB of the transaction blockchain TBK of an object 1 can be automatically combined to form a transaction block TB. In one possible embodiment, this is implemented as soon as a predetermined time period ends. Alternatively, the combination of a plurality of transaction blocks TB can be implemented as soon as the number of the transaction blocks TB contained in the transaction blockchain TBK reaches a threshold. Furthermore, combining the transaction blocks TB of a transaction blockchain TBK can be implemented as a response to a detected event. By way of example, a plurality of transaction blocks TB of a transaction blockchain TBK are combined automatically as soon as low memory is detected in the object data memory 2 .
- a plurality of transaction blocks TB of a transaction blockchain TBK of the object 1 can automatically be combined in response to a user or control command in one possible embodiment.
- the automatic combination of transaction blocks TB of the transaction blockchain TBK can avoid an overflow of the object data memory 2 .
- each transaction block TB of a transaction blockchain TBK has a dedicated timestamp TS, a digital signature and/or proof-of-work evidence. Proof-of-work evidence is the solution to a computationally intensive problem, which should be solved as a function of the block content. Such a computationally intensive problem is also referred to as a cryptographic puzzle.
- a transaction T may contain a program code as a smart contract.
- the program code specifies which transactions T are admissible.
- the linking can be implemented by means of a hash tree, for example a Merkle tree or Patricia tree, the root hash value of which is stored in a transaction block TB.
- an object-related measure may relate to a servicing or repair of a device.
- a transaction T belonging to the measure is entered in the transaction blockchain TBK of the object 1 in the object data memory 2 thereof.
- the corresponding transaction T is digitally signed, for example, by the service technician who has undertaken the repair or the servicing.
- the same device for example a drive device, may undertake a further measure, for example a self-test by the control unit present in the device. If the measure, for example the self-test, is implemented successfully, the control unit of the device can digitally sign the measure (self-test).
- a change in ownership of the object 1 is a further example of a measure.
- a first owner or proprietor is initially responsible for an object 1 within an installation and the responsibility subsequently changes to another second owner or proprietor.
- a measure may contain an entry that specifies the change in ownership or the change in responsibility.
- a smart contract program code for the change in ownership may be contained within a transaction T.
- an owner themselves can specify specific rules according to which an ownership change, for example, is possible, or according to which a diagnostic access, for example, is possible.
- an owner of the object 1 for example a device, can define rules that relate to the operation or the use of the device or the object 1 by way of a transaction T.
- a maximum available power of a drive device 1 and the use duration can be defined.
- this facilitates use-dependent licensing of the drive device or object 1 . Consequently, this type of smart contract has effects on the physical use of the relevant device, for example drive device.
- the object data memory 2 can be provided in a module of a device.
- This module accepts an additional transaction block TB within the transaction blockchain TBK only if the additional transaction block TB is checked as being valid.
- the various transactions T of the transaction block TB are checked or verified in respect of their admissibility.
- This is implemented using the transactions T present in the transaction blockchain TBK by means of their validation program codes VPC or smart contracts. Accordingly, a transaction block TB is only added to the transaction blockchain TBK if it is valid.
- smart contracts, owners, proprietors, users of the device or object 1 can only carry out admissible actions, with the rules to this end being flexibly definable.
- an object data memory module present in the device only accepts an additional transaction block TB if this transaction block TB is confirmed as being valid by a transaction blockchain infrastructure.
- the object data memory module of the device checks a transaction block TB in respect of whether it has been confirmed as valid, for example by virtue of a valid solution being present for the cryptographic puzzle for this transaction block TB.
- a smart contract SC in a drive device may be as follows:
- the smart contract SC limits the maximum available power of a drive device 1 to 600 watts. Moreover, the smart contract SC defines a public key PK, by means of which the digital signature of an admissible change of the use restrictions can be checked.
- FIG. 2 shows an exemplary embodiment of the system according to the invention for controlling and/or monitoring measures that can be undertaken on objects 1 or that can be undertaken by objects 1 themselves.
- the various objects 1 are devices of an installation, which are interconnected by way of a local data bus 4 .
- Each object 1 -i of the installation comprises an integrated object data memory 2 -i.
- a portable write and read device 3 allows a user or operator of the installation to write data to the various object data memories 2 -i and/or read data from the various object data memories 2 -i of the various devices 1 -i. This is implemented in wireless fashion by way of a wireless communications link between the relevant device and the write/read device 3 .
- the portable device 3 is a smartphone of a user, by means of which a corresponding use program is executed.
- the data read from an object data memory 2 can be transferred to a distant server 7 , which has access to an associated database 8 , from the portable write/read device 3 via an access point 5 and a first network 6 in one possible embodiment.
- the local data network of the installation can be connected to the distant server 7 via a gateway 9 and a further network 10 .
- An associated transaction blockchain TBK is assigned to each object 1 of the installation.
- This transaction blockchain TBK of the object 1 is situated in the local object data memory 2 -i of the relevant object 1 in one possible embodiment.
- a twin or copy of the transaction blockchain TBK of the object 1 is situated in the database or the data memory of the distant server 7 in one possible embodiment of the system according to the invention.
- the various objects or devices 1 -i of the installation do not comprise an integrated object data memory 2 and the transaction blockchain TBK of the object 1 is only situated in a corresponding memory region of the distant database 8 .
- the objects 1 -i in the exemplary embodiment illustrated in FIG. 2 are hardware components, in particular devices.
- the objects 1 -i can also be software components which, for example, are situated in a data memory of various devices of the installation and which control or monitor installation elements. By way of example, this also allows servicing measures of software components to be carried out.
- the evaluation of the information contained in the transaction blockchain TBK can be implemented locally in situ at the respective object 1 or from a distance by the server 7 of the system.
- a transaction blockchain TBK of an object 1 can be evaluated by a data processing unit or control unit of the system.
- the transaction blockchains TBK which are stored in the object data memory 2 - 1 of the object 1 - 1 of the installation, can be read by the server 7 via the network 10 for the purposes of evaluating the information contained therein.
- the server 7 receives the information stored in tamper-proof fashion about all object-related measures of the object 1 - 1 , for example servicing measures, repair measures, self-test processes and the like.
- a service person working in the installation can transfer information about various objects or devices 1 of the installation to the central server 7 via the network 6 with the aid of the write and read device 3 .
- step S 54 Whether the respective transaction T is valid is determined in step S 54 . Should the validation be carried out successfully, the relevant transaction T is included in the transaction block TB in step S 55 . If the transaction T is not valid, it is discarded in step S 56 .
- step S 57 a check is carried out as to whether all transactions T were checked as valid so as to complete a transaction block TB. If this is the case, a new transaction block TB can be generated or produced for the transaction blockchain TBK of the corresponding object 1 in step S 58 . If the validation process has not yet been completed, the process returns to step S 53 and the next transaction T is checked in respect of its validity or admissibility.
- the write process or the production process for producing a transaction block TB ends in step S 59 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP17162319.2 | 2017-03-22 | ||
EP17162319.2A EP3379447B1 (fr) | 2017-03-22 | 2017-03-22 | Procédé et dispositif d'enregistrement inviolable d'informations par rapport à des mesures relatives à un objet |
PCT/EP2018/050200 WO2018171949A1 (fr) | 2017-03-22 | 2018-01-04 | Procédé et dispositif de stockage sécurisé lors des manipulations, d'informations relatives à des mesures liées à un objet |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200089915A1 true US20200089915A1 (en) | 2020-03-19 |
Family
ID=58412900
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/495,116 Pending US20200089915A1 (en) | 2017-03-22 | 2018-01-04 | Method and apparatus for tamper-proof storage of information in respect of object-related measures |
Country Status (4)
Country | Link |
---|---|
US (1) | US20200089915A1 (fr) |
EP (1) | EP3379447B1 (fr) |
CN (1) | CN110419045A (fr) |
WO (1) | WO2018171949A1 (fr) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111428277A (zh) * | 2020-03-20 | 2020-07-17 | 中国建设银行股份有限公司 | 区块链数据的校验方法、装置及系统 |
US20200279052A1 (en) * | 2017-09-25 | 2020-09-03 | Bundesdruckerei Gmbh | Datacule structure and method for storing data in a tamper-proof manner |
US10803205B1 (en) * | 2019-03-27 | 2020-10-13 | Alibaba Group Holding Limited | Retrieving public data for blockchain networks using trusted execution environments |
US10911244B2 (en) | 2019-03-27 | 2021-02-02 | Advanced New Technologies Co., Ltd. | Retrieving public data for blockchain networks using highly available trusted execution environments |
US10915521B2 (en) * | 2018-08-21 | 2021-02-09 | Syniverse Technologies, Llc | Blockchain gateway device and associated method of use |
US11038695B2 (en) * | 2019-09-02 | 2021-06-15 | Advanced New Technologies Co., Ltd. | Managing blockchain-based centralized ledger systems |
US11095629B2 (en) | 2019-03-29 | 2021-08-17 | Advanced New Technologies Co., Ltd. | Retrieving access data for blockchain networks using highly available trusted execution environments |
US11250428B2 (en) | 2020-04-22 | 2022-02-15 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
US11455631B2 (en) | 2020-04-22 | 2022-09-27 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
US11455297B2 (en) | 2020-04-22 | 2022-09-27 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111026569B (zh) * | 2019-10-25 | 2023-09-15 | 贵阳信息技术研究院(中科院软件所贵阳分部) | 一种在联盟链中修复指定区块数据的方法 |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160164684A1 (en) * | 2002-12-21 | 2016-06-09 | International Business Machines Corporation | Generation of a digital signature |
US20170046792A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and method for tracking subdivided ownership of connected devices using block-chain ledgers |
US20170178072A1 (en) * | 2015-12-22 | 2017-06-22 | Intel Corporation | System, Apparatus And Method For Transferring Ownership Of A Smart Delivery Package |
US20170295157A1 (en) * | 2016-04-06 | 2017-10-12 | Avaya Inc. | Smartphone fraud-proof authorization and authentication for secure interactions |
US20170345011A1 (en) * | 2016-05-26 | 2017-11-30 | Hitfin, Inc. | System and method executed on a blockchain network |
US20180054491A1 (en) * | 2016-08-19 | 2018-02-22 | Ca, Inc. | Maintaining distributed state among stateless service clients |
US20180078843A1 (en) * | 2016-02-02 | 2018-03-22 | Bao Tran | Smart device |
US20180097883A1 (en) * | 2016-09-30 | 2018-04-05 | The Toronto-Dominion Bank | Automated implementation of provisioned services based on captured sensor data |
US20180183600A1 (en) * | 2016-12-28 | 2018-06-28 | Mastercard International Incorporated | Method and system for providing validated, auditable, and immutable inputs to a smart contract |
US20180276666A1 (en) * | 2017-03-21 | 2018-09-27 | The Toronto-Dominion Bank | Secure offline approval of initiated data exchanges |
US20190052454A1 (en) * | 2016-02-23 | 2019-02-14 | nChain Holdings Limited | System and method for controlling asset-related actions via a block chain |
US20190288854A1 (en) * | 2016-09-18 | 2019-09-19 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Blockchain-based identity authentication method, device, node and system |
US10755226B1 (en) * | 2017-02-24 | 2020-08-25 | EMC IP Holding Company LLC | Information management system using blockchain functionalities |
US20210182433A1 (en) * | 2016-09-09 | 2021-06-17 | Microsoft Technology Licensing, Llc | Tracing objects across different parties |
US11334882B1 (en) * | 2016-03-28 | 2022-05-17 | United Services Automobile Association (Usaa) | Data access management on a distributed ledger system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9967334B2 (en) * | 2015-03-02 | 2018-05-08 | Dell Products Lp | Computing device configuration and management using a secure decentralized transaction ledger |
US10097356B2 (en) * | 2015-07-02 | 2018-10-09 | Nasdaq, Inc. | Systems and methods of secure provenance for distributed transaction databases |
US20170031676A1 (en) * | 2015-07-27 | 2017-02-02 | Deja Vu Security, Llc | Blockchain computer data distribution |
CN106131048B (zh) * | 2016-08-13 | 2020-05-19 | 广州商品清算中心股份有限公司 | 一种用于区块链的非信任远程交易文件安全存储系统 |
CN106651346A (zh) * | 2016-11-28 | 2017-05-10 | 上海凯岸信息科技有限公司 | 基于区块链的征信数据共享与交易系统 |
-
2017
- 2017-03-22 EP EP17162319.2A patent/EP3379447B1/fr active Active
-
2018
- 2018-01-04 US US16/495,116 patent/US20200089915A1/en active Pending
- 2018-01-04 CN CN201880019715.8A patent/CN110419045A/zh active Pending
- 2018-01-04 WO PCT/EP2018/050200 patent/WO2018171949A1/fr active Application Filing
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160164684A1 (en) * | 2002-12-21 | 2016-06-09 | International Business Machines Corporation | Generation of a digital signature |
US20170046792A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and method for tracking subdivided ownership of connected devices using block-chain ledgers |
US20170178072A1 (en) * | 2015-12-22 | 2017-06-22 | Intel Corporation | System, Apparatus And Method For Transferring Ownership Of A Smart Delivery Package |
US20180078843A1 (en) * | 2016-02-02 | 2018-03-22 | Bao Tran | Smart device |
US20190052454A1 (en) * | 2016-02-23 | 2019-02-14 | nChain Holdings Limited | System and method for controlling asset-related actions via a block chain |
US11334882B1 (en) * | 2016-03-28 | 2022-05-17 | United Services Automobile Association (Usaa) | Data access management on a distributed ledger system |
US20170295157A1 (en) * | 2016-04-06 | 2017-10-12 | Avaya Inc. | Smartphone fraud-proof authorization and authentication for secure interactions |
US20170345011A1 (en) * | 2016-05-26 | 2017-11-30 | Hitfin, Inc. | System and method executed on a blockchain network |
US20180054491A1 (en) * | 2016-08-19 | 2018-02-22 | Ca, Inc. | Maintaining distributed state among stateless service clients |
US20210182433A1 (en) * | 2016-09-09 | 2021-06-17 | Microsoft Technology Licensing, Llc | Tracing objects across different parties |
US20190288854A1 (en) * | 2016-09-18 | 2019-09-19 | Cloudminds (Shenzhen) Robotics Systems Co., Ltd. | Blockchain-based identity authentication method, device, node and system |
US20180097883A1 (en) * | 2016-09-30 | 2018-04-05 | The Toronto-Dominion Bank | Automated implementation of provisioned services based on captured sensor data |
US20180183600A1 (en) * | 2016-12-28 | 2018-06-28 | Mastercard International Incorporated | Method and system for providing validated, auditable, and immutable inputs to a smart contract |
US10755226B1 (en) * | 2017-02-24 | 2020-08-25 | EMC IP Holding Company LLC | Information management system using blockchain functionalities |
US20180276666A1 (en) * | 2017-03-21 | 2018-09-27 | The Toronto-Dominion Bank | Secure offline approval of initiated data exchanges |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200279052A1 (en) * | 2017-09-25 | 2020-09-03 | Bundesdruckerei Gmbh | Datacule structure and method for storing data in a tamper-proof manner |
US11669631B2 (en) * | 2017-09-25 | 2023-06-06 | Bundesdruckerei Gmbh | Datacule structure and method for storing data in a tamper-proof manner |
US10915521B2 (en) * | 2018-08-21 | 2021-02-09 | Syniverse Technologies, Llc | Blockchain gateway device and associated method of use |
US11082240B2 (en) | 2019-03-27 | 2021-08-03 | Advanced New Technologies Co., Ltd. | Retrieving public data for blockchain networks using highly available trusted execution environments |
US11323271B2 (en) | 2019-03-27 | 2022-05-03 | Advanced New Technologies Co., Ltd. | Retrieving public data for blockchain networks using highly available trusted execution environments |
US10824763B2 (en) | 2019-03-27 | 2020-11-03 | Alibaba Group Holding Limited | Integrity of communications between blockchain networks and external data sources |
US10803205B1 (en) * | 2019-03-27 | 2020-10-13 | Alibaba Group Holding Limited | Retrieving public data for blockchain networks using trusted execution environments |
US11080430B2 (en) | 2019-03-27 | 2021-08-03 | Advanced New Technologies Co., Ltd. | Integrity of communications between blockchain networks and external data sources |
US11449641B2 (en) | 2019-03-27 | 2022-09-20 | Advanced New Technologies Co., Ltd. | Integrity of communications between blockchain networks and external data sources |
US11088850B2 (en) | 2019-03-27 | 2021-08-10 | Advanced New Technologies Co., Ltd. | Retrieving public data for blockchain networks using highly available trusted execution environments |
US10911244B2 (en) | 2019-03-27 | 2021-02-02 | Advanced New Technologies Co., Ltd. | Retrieving public data for blockchain networks using highly available trusted execution environments |
US11095629B2 (en) | 2019-03-29 | 2021-08-17 | Advanced New Technologies Co., Ltd. | Retrieving access data for blockchain networks using highly available trusted execution environments |
US11405372B2 (en) | 2019-03-29 | 2022-08-02 | Advanced New Technologies Co., Ltd. | Retrieving access data for blockchain networks using highly available trusted execution environments |
US11038695B2 (en) * | 2019-09-02 | 2021-06-15 | Advanced New Technologies Co., Ltd. | Managing blockchain-based centralized ledger systems |
CN111428277A (zh) * | 2020-03-20 | 2020-07-17 | 中国建设银行股份有限公司 | 区块链数据的校验方法、装置及系统 |
US11250428B2 (en) | 2020-04-22 | 2022-02-15 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
US11455631B2 (en) | 2020-04-22 | 2022-09-27 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
US11455297B2 (en) | 2020-04-22 | 2022-09-27 | Alipay (Hangzhou) Information Technology Co., Ltd. | Managing transaction requests in ledger systems |
Also Published As
Publication number | Publication date |
---|---|
EP3379447B1 (fr) | 2022-04-27 |
EP3379447A1 (fr) | 2018-09-26 |
CN110419045A (zh) | 2019-11-05 |
WO2018171949A1 (fr) | 2018-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200089915A1 (en) | Method and apparatus for tamper-proof storage of information in respect of object-related measures | |
CN111543031B (zh) | 用于控制和/或监控装置的方法和控制系统 | |
US20210055718A1 (en) | Computer-implemented method for providing data, in particular for conformity tracking | |
CN111445333B (zh) | 区块生成方法、装置、计算机设备以及存储介质 | |
CN111492624B (zh) | 用于控制和/或监控装置的方法和控制系统 | |
CN110971656B (zh) | 区块链中的数据的安全存储 | |
US9544300B2 (en) | Method and system for providing device-specific operator data for an automation device in an automation installation | |
CN103580852B (zh) | 安全元件以及初始化安全元件的方法和系统 | |
CN110569251A (zh) | 一种数据处理方法、相关设备及计算机可读存储介质 | |
CN101276389B (zh) | 单个物理可信平台模块内的多个逻辑可信平台模块的分离 | |
CN111492355B (zh) | 用于控制和/或监控装置的方法和控制系统 | |
CN102549576A (zh) | 审核设备 | |
US20060218649A1 (en) | Method for conditional disclosure of identity information | |
CN112313908B (zh) | 用于控制和/或监控装置的方法和控制系统 | |
CN113111389A (zh) | 测量设备的信息管理方法及装置 | |
CN111090581A (zh) | 智能合约测试方法、装置、计算机设备和存储介质 | |
CN112597158A (zh) | 数据匹配方法、装置、计算机设备和存储介质 | |
CN115454974A (zh) | 一种产品检验方法、系统、终端及计算机存储介质 | |
CN111869165B (zh) | 用于控制和/或监控装置的方法和控制系统 | |
KR20140048094A (ko) | 이동 단말 장치 칩 프로그래밍을 위한 방법 | |
JP6477553B2 (ja) | プログラム開発支援装置、プログラム開発支援プログラムおよびプログラム開発支援方法 | |
US20220114276A1 (en) | Controlling a data network with respect to a use of a distributed database | |
CN111552989A (zh) | 基于区块链的业务数据处理方法、装置、设备和存储介质 | |
US11909821B2 (en) | Method for processing application programs in a distributed automation system | |
CN112350868A (zh) | 开墙处理方法、装置、服务器、系统及可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FALK, RAINER;REEL/FRAME:050686/0635 Effective date: 20190930 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
ZAAB | Notice of allowance mailed |
Free format text: ORIGINAL CODE: MN/=. |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |